The Evolution of Data Center Security at the Enclosure Level

Size: px
Start display at page:

Download "The Evolution of Data Center Security at the Enclosure Level"

Transcription

1 The Evolution of Data Center Security at the Enclosure Level Daniel Adamus, B.S., MBA Director of Marketing and Product Management Great Lakes Case & Cabinet

2 The Evolution of Data Center Security at the Enclosure Level

3 The Traditional Role of the Enclosure Simple Protection for Equipment Basic Security for Equipment Little to No Internal Cable Management Flood Cooling or Hot / Cold Aisle Deployment

4 An Expanded Role Today for Today s Data Center Enclosure Facilitates Intelligent Power and Real Time DCIM Monitoring Expanded Internal and External Cable Management Expanded Data Center and Enclosure Security A Variety of Managed Cooling Solutions Integral part of the building infrastructure

5 Why has Security become more important? Recent U.S. Data Breaches have had significant impact on the Government, Bank, Retail and Corporate Sectors Source: Bloomberg and The Heritage Foundation:

6 Why has Security become more important? Target attack shows danger of remotely accessible HVAC systems By Jaikumar Vijayan Computerworld Feb 7, :52 AM PT Cloud security service provider Qualys said that its researchers have discovered that most of about 55,000 HVAC systems connected to the Internet over the past two years have flaws that can be easily exploited by hackers. In Target's case, hackers stole login credentials belonging to a company that provides it HVAC services and used that access to gain a foothold on the company's payment systems. HVAC systems connect to networks at various retail companies, government buildings and even hospitals, according to the security firm. HVAC vendors and other third parties often have remote access right to these systems for administrative and support purposes. Hackers can exploit these systems to gain access to enterprise networks and leapfrog onto other corporate systems, Qualys said. Source: Bloomberg and The Heritage Foundation:

7 Why has Security become more important? Source: IBM Security Systems This identification and exploitation of a point of vulnerability in a data center or IT system is now being referred to as the Bonnie and Clyde Syndrome. Just as Bonnie and Clyde targeted rural banks as the most vulnerable, those seeking to attack systems will look for low priority systems which can be penetrated horizontally as a means of gaining more direct access to penetrate the main data and to extract valuable information. Source: Jean-Paul Daemen, Uptime Devices

8 Why has Security become more important? Potential Threats Posed by State-Sponsored Cyberwarfare/Cyberterrorism (Russia/China/North Korea) Domestic Physical Terrorism Washington Navy Yard Attack by Former Contractor with a Stolen Card Key O Hare Airport Attack by Subcontractor with Access

9 Why has Security become more important? Growth of Colocation Data Centers Since the last financial downturn in 2008, there has been steady growth of colocation data centers. That trend is forecasted to continue on a rapid pace. Analysts predict that between now and 2017, the global colocation data center footprint will grow close to 75 percent. (451 Research April 2015) Source: As more and more organizations migrate their data centers from their own control to a shared space location, there have been increased efforts (both by tenants and colo providers) to provide greater peace of mind through the deployment of enhanced security measures throughout these data centers. For many considering a move to a colocation facility, security is often their main concern.

10 Why has Security become more important? Not Only From Outside; Threats Often Come from Internal Team Members: A 2011 Gabriel survey estimated that more than 60% of malicious security breaches are at the hands of insiders. Source: Digitus Biometrics Access Security Solutions

11 Why has Security become more important? The Costs of a Data Breach are Substantial In 2015, IBM sponsored the 10 th Annual Cost of Data Breach Study conducted by the Ponemon Institute. The average consolidated total cost of a single data breach is estimated at $3.8 million (up 23% from 2013) The cost for each lost or stolen record containing sensitive and confidential information is estimated to be $ per record Source: IBM

12 Why has Security become more important? The Threat of a Data Breach is Constant In a March 20, 2012 U.S. News and World Report article, a spokesman for the National Nuclear Security Administration (NNSA) said the Nuclear Security Enterprise, the computer systems of the agency in charge of America s nuclear weapons stockpile are under constant attack and experience up to 10 million security significant cyber security events each day. Of the security significant events, less than one hundredth of a percent can be categorized as successful attacks against the Nuclear Security Enterprise computing infrastructure. That still amounts to a maximum of 1,000 of these events each day, just at this agency alone! Source: U.S. News and World Report

13 Why has Security become more important? Threats Often Come from Internal Team Members: Source: Digitus Biometrics Access Security Solutions

14 Why has Security become more important? Threats Often Come from Internal Team Members: Source: Digitus Biometrics Access Security Solutions

15 Why has Security become more important? Threats Often Come from Internal Team Members: Source: Digitus Biometrics Access Security Solutions

16 Why Consider Security at the Enclosure Level? While many companies and organizations are studying security throughout the data center, the buck stops at the enclosure. Every system and networking component within the data center ends up or passes through the enclosure. In a data center of thousands of enclosures, the easiest place to penetrate security without detection can be a single enclosure.

17 Security at the Enclosure Level Enclosure manufacturers are well aware of the need for increased security. Many have been working to refine their products and to work with accessory supplier partners and third-party vendors to develop effective security solutions which are compatible and complimentary to any and all additional security measures within the data center space.

18 Enclosure Construction An enclosure as a security platform must be designed and manufactured to minimize the risk of a break-in This is often accomplished by design, engineering and manufacturing to tight tolerances, eliminating any gaps which might exist among external components. Doors, Sides and Top Panels are produced and assembled at the same time, designed to fit perfectly. Often times frames and components are produced off-shore, shipped separately and then are configured as needed. (Fit and finish parameters may be more loose in the design of these products to ensure assembly, lot-to-lot.)

19 Enclosure Construction Some examples: Fit and Finish is important in Enclosure Construction

20 Enclosure Construction Some examples: This Gap could allow the latch to be forced open with relative ease

21 Enclosure Construction Some examples: Gap on the hinge side of the door

22 Enclosure Construction Doors & Locks Retro-Fitting Older Enclosures to a Common Security Standard In many cases a data center may have legacy enclosures from many different manufacturers. They may be easily brought to a common security standard by the creation of aftermarket doors and/or side panels which provide the desired fit and level of security desired for all enclosures in the data center space.

23 Enclosure Construction Doors & Locks The door frame itself is an important security feature. If strong and well-seated it can be a deterrent to anyone who may try to force their way into the Enclosure. While some manufacturers design their enclosures to maximize the mesh area (to allow the most air flow possible) they may also compromise the integrity of the handle with regard to security. It is much easier to force open a lock mounted in mesh than a lock installed within the door frame itself.

24 A Variety of Handles Provide Multiple Methods and Layers for Added Security Basic Examples of Security Handles for Enclosures : Standard Locking Swing Handle 4 Digit Combination with Key 3 Digit Combination with Key Locking Swing Handle with Padlock

25 A Variety of Handles Provide Multiple Methods and Layers for Added Security Electromechanical Locks: Electromechanical locks are traditionally powered via 110, ethernet or by battery and use some type of key, faub or proximity card reader. They traditionally also include a key lock or other method of access as a back-up in case of power failure. These products are available from a number of suppliers and in a variety of price ranges, based on ease of operation, flexibility of software and the types of cards which may be used in conjunction with the system, as well as the ability of this type of lock to foldinto the security system of the data center, the building and/or the campus upon which the data center is located.

26 A Variety of Handles Provide Multiple Methods and Layers for Added Security Temporary Access Number / Transaction Authentication Number or TAN Locks: Use of a TAN Lock requires some type of programming device which is used for the first installation process. With this device all necessary data is transmitted to the handle to bring it online and into operation. The interface is with a simple plug between the handle and programming device. The TAN Lock is a centralized, tamper proof latching and locking system, for data centers and other security sensitive applications. After approving an opening event from your computer, an additional TAN (Transaction Authentication Number) code is required to open the lock. Individual TAN codes can be issued by the administrator for unlimited or specified access, restricted to a particular window-in-time. After configuration, the lock may be programmed and monitored remotely by the administrator. A single lock can handle a large number of users with specific TAN codes

27 A Variety of Handles Provide Multiple Methods and Layers for Added Security Biometric Locks: Biometric locks utilize a fingerprint, retina scan or facial recognition software to allow access. This particular biometric handle utilizes an algorithm created from seven points on a person s fingerprint to create an access signature. No personal information is captured as part of this system so it is fully HIPAA compliant. This particular system also senses body temperature and pulse so the lock must be accessed by a living person. It can also register a panic finger to let authorities know the enclosure was opened by someone in distress. The software associated with this lock is compatible with any other security or DCIM software. At this time it is the only lock system which can provide an undisputable audit trail.

28 A Variety of Handles Provide Multiple Methods and Layers for Added Security Biometric Locks: Biometric locks may manage a single enclosure in a remote location or thousands of enclosures in a data center through a bus system which controls access at each door. They can also work in conjunction with keyed locks or card readers for added layers or security. The hardware to support the system has evolved dramatically in the last three years; what began as a 1RMU rack-mounted controller has shrunk, first to a zero-u component and today, the latest version is just 4 inches in length and can be installed anywhere in the enclosure.

29 A Variety of Handles Provide Multiple Methods and Layers for Added Security Biometric Locks: One of the few drawbacks with this level of security is the cost associated with biometric handles. An economical deployment throughout a data center is often provided by the installation of a biometric access handle on the front of each enclosure and a complimentary electromechanical handle on the rear door. A bus access control system saves cost by eliminating the need for a controller, network point and power supply at each cabinet. A sophisticated bus architecture system distributes fail-safe signals and electrical power from a single controller up to 64 cabinet door locks. The bus system also offers multiple options for authentication either at the cabinet or at the end of a row of cabinets.

30 Use of Color to Denote Access The use of color can provide a sense of identity within a colocation environment with unique, corporate or custom colors while at the same time identifying levels of access for those monitoring activity within the data center space. Customer Supplied Photos

31 Monitoring Considerations Within the Enclosure Remote Physical Monitoring (RPM) Devices With capabilities which rival any CPU, these rack mounted devices are designed to collect, process and report information on a number of conditions within the enclosure, to include, temperature, water, humidity, and air flow. With the proper sensors, these devices can also detect motion near or within the enclosure, whether a door has been accessed, if a side panel has been removed or even if either was tampered with.

32 Monitoring Considerations Within the Enclosure Remote Physical Monitoring (RPM) Devices These devices are designed to be daisy-chained so that a single unit may collect information and monitor a number of enclosures at any time. These products are traditionally vendor-neutral so they may work with sensors from a number of manufacturers and so they may be able to report data through any type of Data Center Infrastructure Management (DCIM) system or software.

33 Monitoring Considerations Within the Enclosure Power Distribution Units (PDUs) Monitored IP Addressable Remote Shutdown Event Notification Most security enclosure platforms allow for the mounting of multiple PDUs in the rear of the enclosure. Monitored PDU While designed to monitor a number of variables related to power at the outlet level, many intelligent PDUs have additional capacity for event monitoring and the reporting of anything which may be considered a threat to the enclosure in the same manner as an RPM.

34 Power Considerations Many traditional PDUs often utilize physical wire construction which can generate additional heat in the rear of the enclosure Some utilize metal housings resulting in hot touch points Modular Construction allows for an endless mix of receptacle configurations Solid State Construction and aluminum housings help to minimize residual heat generated by the PDU

35 Additional Physical Security Around the Enclosure Especially in a Colocation Environment, a customer may wish to have additional security in the form of a surround, cage or privacy panel system to define their individual space and to further restrict access to their enclosures.

36 Customer Supplied Photo This privacy panel system is designed to be modular. The individual panels can be designed to accommodate any number of enclosures in a variety of configurations, based on the needs of each colocation customer.

37 Additional Physical Security Around the Enclosure Cage Systems Source: This ceiling grid solution is available in a 4ˈx 4ˈ grid and 2ˈx 4ˈ grid for light-fixture drop-in. It has the strength and reinforcement to support the weight and intricacies of the overhead cable and utility distribution required in a data center. It has the aesthetic appeal of the drop ceiling, but in a single construction. Customer Supplied Photo In this case, customized privacy panels were designed and constructed to be secured to the ceiling grid system to prevent any incursion into the customer s caged space within the colocation data center.

38 Covering the Basics: Providing Protection, Often on Multiple Levels Customer Supplied Photos Privacy panel posts are locked to the raised floor and assembly can only be accomplished from the inside.

39 Covering the Basics: Providing Protection Often on Multiple Levels Door shown from the outside. Door can also accept a number of thirdparty security options. Privacy door from the inside, showing the stiffeners and the latch to prevent personnel from being locked-in. Customer Supplied Photo

40 Covering the Basics: Providing Protection Often on Multiple Levels Customer Supplied Photo Panels and extensions are easily assembled, with standard hardware. Extension panels allow for adjustment of height to meet any changes in room design within the data center complex. Panels for this system are available in three heights, 8, 9 and 14 feet. Custom heights are also available. Panels may only be accessed from inside the system

41 Additional Physical Security Around the Enclosure Containment as a Security Mechanism Containment (the isolation and concentration of conditioned air or heated exhaust) is a growing trend in data center efficiency. Containment strives to deliver the most effective amount of conditioned air possible at the most efficient cubic feet per minute (CFM) to the equipment mounted within the enclosure and/or to extract the heated exhaust from the rear of the enclosure, while eliminating bypass airflow and hot air recirculation. It may also be possible in the future to add additional security measures to containment pods not only to ensure energy efficiency but to also restrict unauthorized access to those enclosures deployed in each pod.

42 Expanded Options for Security Modular Space Modular or Containerized Data Centers Easy to Deploy in a variety of sizes Based on ISO shipping Containers Custom construction for assembly on-site Easy to Customize for operations (data center whitespace in a box ) Many organizations treat modular data centers as equipment and not as buildings, making it easier to expand a data center without all the effort, approval procedures and organizational processes required of brick & mortar expansions. Instead it can be leased or part of a lease-to-own program which shows up on a budget as a line item expense rather than a capital purchase.

43 Expanded Options for Security Modular Space Whether on-site or in a highly controlled environment, modular or containerized data centers can offer an immediate plug & play solution to supplement an existing data center, provide DRC support or even provide a greenfield solution. Any or all of the options for enclosures discussed previously may also be deployed within the modular space for additional layers of security beyond that provided by restricted access to the module.

44 Future-Proofing In any data center deployment it is important to consider the best practice of selecting a single enclosure platform which, as technologies and equipment evolve, will allow you to utilize a number of accessories and techniques when and where needed throughout the lifespan of your data center.

45 Enclosure Security: A Continuous Improvement Process Once a decision has been made to deploy security at the enclosure level, it is not a one-and-done effort. It is a Continuous Improvement Process requiring ongoing upgrades as firmware and software updates are available. It also requires constant diligence to ensure that the security evolves to keep pace with those who will strive to breach it.

46

Data center upgrade proposal. (phase one)

Data center upgrade proposal. (phase one) Data center upgrade proposal (phase one) Executive Summary Great Lakes began a recent dialogue with a customer regarding current operations and the potential for performance improvement within the The

More information

Source: Infosys e-book A Successful Data Center Migration g Cradle to Grave

Source: Infosys e-book A Successful Data Center Migration g Cradle to Grave The Future-Proofing Role of the Enclosure In Data Center Migration Traditional Definition of Data Center Migration In years past, the discussion of migration with regard to the data center, referred to

More information

Data Center Rack Systems Key to Business-Critical Continuity. A White Paper from the Experts in Business-Critical Continuity TM

Data Center Rack Systems Key to Business-Critical Continuity. A White Paper from the Experts in Business-Critical Continuity TM Data Center Rack Systems Key to Business-Critical Continuity A White Paper from the Experts in Business-Critical Continuity TM Executive Summary At one time, data center rack enclosures and related equipment

More information

Optimizing Rack Power Distribution

Optimizing Rack Power Distribution Optimizing Rack Power Distribution Best practices for selecting the right rack power distribution unit for your environment By Joe Skorjanec Product Manager Eaton Executive summary With information increasingly

More information

Customized Server Cabinets

Customized Server Cabinets GOING GREEN WITH CUSTOMIZABLE CABINETS AND RACKS Designed to provide industry leading airflow, CyrusOne s cabinets and rack solutions promote optimal cooling and contribute to reduced power consumption.

More information

Containment Solutions

Containment Solutions Containment Solutions Improve cooling efficiency Separate hot and cold air streams Configured to meet density requirements Suitable for commercial and SCEC endorsed cabinets Available for retrofit to SRA

More information

ELM Security System Electronic Locking & Monitoring

ELM Security System Electronic Locking & Monitoring Whitepaper ELM Security System Electronic Locking & Monitoring Issue: September 2006 EMKA Beschlagteile GmbH & Co.KG Release: 1.0 Langenberger Str. 32 42551 Velbert Germany Tel.: 0049 (0) 20 51 / 2 73-0

More information

Dealing with Thermal Issues in Data Center Universal Aisle Containment

Dealing with Thermal Issues in Data Center Universal Aisle Containment Dealing with Thermal Issues in Data Center Universal Aisle Containment Daniele Tordin BICSI RCDD Technical System Engineer - Panduit Europe Daniele.Tordin@Panduit.com AGENDA Business Drivers Challenges

More information

Data Center Components Overview

Data Center Components Overview Data Center Components Overview Power Power Outside Transformer Takes grid power and transforms it from 113KV to 480V Utility (grid) power Supply of high voltage power to the Data Center Electrical Room

More information

DATA CENTRES POWERED BY EXCEL

DATA CENTRES POWERED BY EXCEL DATA CENTRES POWERED BY EXCEL MAXIMISE EFFICIENCY BOOST PERFORMANCE INCREASE R.O.I. WITHOUT COMPROMISE Excel is a world-class premium performance end-to-end infrastructure solution. Designed, manufactured,

More information

Security and Environmental Monitoring Solutions

Security and Environmental Monitoring Solutions The NetBotz product line offers an active monitoring solution designed to protect against physical threats, environmental or human, that can cause downtime or disruption to your IT infrastructure. This

More information

Power and Cooling Guidelines for Deploying IT in Colocation Data Centers

Power and Cooling Guidelines for Deploying IT in Colocation Data Centers Power and Cooling Guidelines for Deploying IT in Colocation Data Centers White Paper 173 Revision 0 by Paul Lin and Victor Avelar Executive summary Some prospective colocation data center tenants view

More information

Product Guide. Product Guide 2014 EMKA, Inc. Page 1 of 12

Product Guide. Product Guide 2014 EMKA, Inc. Page 1 of 12 Product Guide 2014 Product Guide 2014 EMKA, Inc. Page 1 of 12 Digitus BIOMETRIC ACCESS CONTROL Secure every access point EMKA's proven manufacturing process and Digitus Biometric's Superior Engineering

More information

Best Practices for Wire-free Environmental Monitoring in the Data Center

Best Practices for Wire-free Environmental Monitoring in the Data Center White Paper 11800 Ridge Parkway Broomfiled, CO 80021 1-800-638-2638 http://www.42u.com sales@42u.com Best Practices for Wire-free Environmental Monitoring in the Data Center Introduction Monitoring for

More information

THE KEY TO DATA CENTRE INFRASTRUCTURE

THE KEY TO DATA CENTRE INFRASTRUCTURE ENCLOSURES, RACKS & CABINETS THE KEY TO DATA CENTRE INFRASTRUCTURE PAGE 52 www.insidenetworksme.com JULY 15 Jonathan Duncan, Data Centre and Integrated Solutions Director, Schneider Electric, outlines

More information

7QUESTIONSYOUNEEDTOASKBEFORE CHOOSINGACOLOCATIONFACILITY FORYOURBUSINESS

7QUESTIONSYOUNEEDTOASKBEFORE CHOOSINGACOLOCATIONFACILITY FORYOURBUSINESS 7QUESTIONSYOUNEEDTOASKBEFORE CHOOSINGACOLOCATIONFACILITY FORYOURBUSINESS ExecutiveBrief P a g e 1 Executive Brief 7 Questions You Need to Ask Before Choosing a Colocation Facility for Your Business Choosing

More information

APC APPLICATION NOTE #92

APC APPLICATION NOTE #92 #92 Best Practices for Designing Data Centers with the InfraStruXure InRow RC By John Niemann Abstract The InfraStruXure InRow RC is designed to provide cooling at the row and rack level of a data center

More information

Cabinets 101: Configuring A Network Or Server Cabinet

Cabinets 101: Configuring A Network Or Server Cabinet Cabinets 101: Configuring A Network Or Server Cabinet North, South and Central America White Paper May 2012 www.commscope.com Contents Background Information 3 What is a network or server cabinet? 3 What

More information

Overview brochure. Power management solutions for network closets, server rooms and data center environments

Overview brochure. Power management solutions for network closets, server rooms and data center environments Overview brochure Power management solutions for network closets, server rooms and data center environments Every IT solution is unique. Be it a network closet, server room, data center or something else

More information

DATA CENTER RACK SYSTEMS: KEY CONSIDERATIONS IN TODAY S HIGH-DENSITY ENVIRONMENTS WHITEPAPER

DATA CENTER RACK SYSTEMS: KEY CONSIDERATIONS IN TODAY S HIGH-DENSITY ENVIRONMENTS WHITEPAPER DATA CENTER RACK SYSTEMS: KEY CONSIDERATIONS IN TODAY S HIGH-DENSITY ENVIRONMENTS WHITEPAPER EXECUTIVE SUMMARY Data center racks were once viewed as simple platforms in which to neatly stack equipment.

More information

(Examples of various colocation sites)

(Examples of various colocation sites) Overview The largest factor involved in maintaining business servers today are the fixed costs associated with data centers. The Colocation Environment is an outsourcing model whereby a colocation company

More information

AisleLok Modular Containment vs. Legacy Containment: A Comparative CFD Study of IT Inlet Temperatures and Fan Energy Savings

AisleLok Modular Containment vs. Legacy Containment: A Comparative CFD Study of IT Inlet Temperatures and Fan Energy Savings WH I TE PAPE R AisleLok Modular Containment vs. : A Comparative CFD Study of IT Inlet Temperatures and Fan Energy Savings By Bruce Long, Upsite Technologies, Inc. Lars Strong, P.E., Upsite Technologies,

More information

Secure your IT equipment with confidence... secure with NetClosure

Secure your IT equipment with confidence... secure with NetClosure Secure your IT equipment with confidence... secure with NetClosure SERVER CABINETS NetClosure s REM Series Server Cabinet is the ultimate solution designed and engineered for demanding data center environments.

More information

Password Management Evaluation Guide for Businesses

Password Management Evaluation Guide for Businesses Password Management Evaluation Guide for Businesses White Paper 2016 Executive Summary Passwords and the need for effective password management are at the heart of the rise in costly data breaches. Various

More information

DATA CENTER SOLUTIONS

DATA CENTER SOLUTIONS DATA CENTER SOLUTIONS Nobody Makes Better Data Center Equipment Maximize availability, manageability and efficiency with cost-effective solutions from a dependable partner. Provide reliable, efficient

More information

APC APPLICATION NOTE #112

APC APPLICATION NOTE #112 #112 Best Practices for Deploying the InfraStruXure InRow SC By David Roden Abstract The InfraStruXure InRow SC (ACSC100 and ACSC101) is a self-contained air conditioner for server rooms and wiring closets.

More information

Supporting Cisco Switches In Hot Aisle/Cold Aisle Data Centers

Supporting Cisco Switches In Hot Aisle/Cold Aisle Data Centers CABINETS: ENCLOSED THERMAL MOUNTING MANAGEMENT SYSTEMS WHITE PAPER Supporting Cisco Switches In Hot Aisle/Cold Aisle Data Centers 800-834-4969 techsupport@chatsworth.com www.chatsworth.com All products

More information

Electronic Access Control Solutions

Electronic Access Control Solutions Electronic Access Control Solutions Access Control Access Control Digitus BIOMETRIC ACCESS CONTROL Secure every access point The new db (Digitus Biometric) Biolock Technology paired with our Electromechanical

More information

2006 APC corporation. Cooling Solutions and Selling Strategies for Wiring Closets and Small IT Rooms

2006 APC corporation. Cooling Solutions and Selling Strategies for Wiring Closets and Small IT Rooms Cooling Solutions and Selling Strategies for Wiring Closets and Small IT Rooms Agenda Review of cooling challenge and strategies Solutions to deal with wiring closet cooling Opportunity and value Power

More information

1. Introduction... 2 2. Availability & types of colocation... 2

1. Introduction... 2 2. Availability & types of colocation... 2 Service Description Service Description COLOCATION SERVICES 1. Introduction... 2 2. Availability & types of colocation... 2 2.1 Signature Colocation... 2 2.2 Sterling Colocation... 3 2.3 Network Colocation...

More information

Managing Cooling Capacity & Redundancy In Data Centers Today

Managing Cooling Capacity & Redundancy In Data Centers Today Managing Cooling Capacity & Redundancy In Data Centers Today About AdaptivCOOL 15+ Years Thermal & Airflow Expertise Global Presence U.S., India, Japan, China Standards & Compliances: ISO 9001:2008 RoHS

More information

Data Centers and Mission Critical Facilities Operations Procedures

Data Centers and Mission Critical Facilities Operations Procedures Planning & Facilities Data Centers and Mission Critical Facilities Operations Procedures Attachment A (Referenced in UW Information Technology Data Centers and Mission Critical Facilities Operations Policy)

More information

Cloud Management. Overview. Cloud Managed Networks

Cloud Management. Overview. Cloud Managed Networks Datasheet Cloud Management Cloud Management Overview Meraki s cloud based management provides centralized visibility & control over Meraki s wired & wireless networking hardware, without the cost and complexity

More information

Strategies for Deploying Blade Servers in Existing Data Centers

Strategies for Deploying Blade Servers in Existing Data Centers Strategies for Deploying Blade Servers in Existing Data Centers By Neil Rasmussen White Paper #125 Revision 1 Executive Summary When blade servers are densely packed, they can exceed the power and cooling

More information

Contents Error! Bookmark not defined. Error! Bookmark not defined. Error! Bookmark not defined.

Contents Error! Bookmark not defined. Error! Bookmark not defined. Error! Bookmark not defined. We Do It Better. Contents Introduction...3 Service and Support...3 Data Center Details...4 Security...4 Location...4 Power...4 Humidification...5 AC...5 Cooling...6 Datacenter Features...6 SAS 70...6 PCI

More information

Raised Floor Data Centers Prepared for the Future

Raised Floor Data Centers Prepared for the Future Raised Floor Data Centers Prepared for the Future Raised Floors Protect My Investment by Providing a Foundation for Current and Future Technologies. Creating the Future Proof Data Center Environment The

More information

MAXIMIZING YOUR DATA CENTER INFRASTRUCTURE: CENTRALIZED MANAGEMENT AND WIRE-FREE ENVIRONMENTAL MONITORING

MAXIMIZING YOUR DATA CENTER INFRASTRUCTURE: CENTRALIZED MANAGEMENT AND WIRE-FREE ENVIRONMENTAL MONITORING MAXIMIZING YOUR DATA CENTER INFRASTRUCTURE: CENTRALIZED MANAGEMENT AND WIRE-FREE Chris C. Gaskins Vice President of Product Development RF Code, Inc. AUGUST 2010 Shawn Griggs Director of Product Management

More information

Small Data / Telecommunications Room on Slab Floor

Small Data / Telecommunications Room on Slab Floor Small Data / Telecommunications Room on Slab Floor Small Data / Telecommunications Room on Slab Floor During a warm summer period in 2008, Great Lakes experienced a network outage due to a switch failure

More information

Scalable. Affordable. Flexible. Fast.

Scalable. Affordable. Flexible. Fast. Modular Data Center Solutions Scalable. Affordable. Flexible. Fast. Build the data center you need today with the flexibility to meet tomorrow s challenges The only constant in business is change. Fluctuations

More information

Achieving Compliance with the PCI Data Security Standard

Achieving Compliance with the PCI Data Security Standard Achieving Compliance with the PCI Data Security Standard June 2006 By Alex Woda, MBA, CISA, QDSP, QPASP This article describes the history of the Payment Card Industry (PCI) data security standards (DSS),

More information

Doc Ref: 2015.06.01.002. 602.783.1112 baselayer.com 2015 BASELAYER TECHNOLOGY, LLC

Doc Ref: 2015.06.01.002. 602.783.1112 baselayer.com 2015 BASELAYER TECHNOLOGY, LLC TM 602.783.1112 baselayer.com 2015 BASELAYER TECHNOLOGY, LLC TM D400E Data Module (60Hz) The EDGE D400E is designed to meet high power density requirements for both the HPC and Web Scale environments while

More information

Anixter ipassured SM for Data Centres. Products. Technology. Services. Delivered Globally.

Anixter ipassured SM for Data Centres. Products. Technology. Services. Delivered Globally. Anixter ipassured SM for Data Centres Products. Technology. Services. Delivered Globally. Anixter is a leading global supplier of communications and security products, electrical and electronic wire and

More information

Security Issues with Integrated Smart Buildings

Security Issues with Integrated Smart Buildings Security Issues with Integrated Smart Buildings Jim Sinopoli, Managing Principal Smart Buildings, LLC The building automation industry is now at a point where we have legitimate and reasonable concern

More information

Data Center Trend: Distributed Power in the White Space

Data Center Trend: Distributed Power in the White Space Data Center Trend: Distributed Power in the White Space By Jason Anderson Product Line Manager Eaton Executive summary Cloud computing vendors and colocation data centers make every effort to maximize

More information

Traditional Data Centers

Traditional Data Centers Data Centers 2 Lectrus is a leading electrical systems integrator and custom metal enclosure manufacturer. We build fully integrated modules for power distribution, power generation, cooling and IT equipment

More information

Cabinet V800 V800 CABINETS

Cabinet V800 V800 CABINETS V800 Cabinet Siemon s V800 cabinets provide a robust, cost-effective enclosure solution that provides valuable Zero-U space on each side of the equipment rails for cable management, PDU mounting or connectivity

More information

Managing the Data Center One Rack at a Time

Managing the Data Center One Rack at a Time Managing the Data Center One Rack at a Time No Limits Software White Paper #6 By David Cole 2013 No Limits Software. All rights reserved. No part of this publication may be used, reproduced, photocopied,

More information

Cloud Management. Overview. Cloud Managed Networks

Cloud Management. Overview. Cloud Managed Networks Datasheet Cloud Management Cloud Management Overview Meraki s cloud based management provides centralized visibility & control over Meraki s wired & wireless networking hardware, without the cost and complexity

More information

Essential Rack System Requirements for Next Generation Data Centers

Essential Rack System Requirements for Next Generation Data Centers Essential Rack System Requirements for Next Generation Data Centers White Paper #7 Revision 2 Executive Summary Effective mission critical installations must address the known problems and challenges relating

More information

Network-critical Physical Infrastructure (NCPI) Vulnerability Assessment

Network-critical Physical Infrastructure (NCPI) Vulnerability Assessment Network-critical Physical Infrastructure (NCPI) Vulnerability Assessment Explanation: Network-critical physical infrastructure (NCPI) is the foundation upon which IT networks reside. It consists of power,

More information

Application Briefs: Remote Office Environment

Application Briefs: Remote Office Environment Overview Remote offices are a definite sign of growth, but it can constitute an immense challenge from an IT infrastructure standpoint. Remote offices may include a wide variety of wiring closets and small

More information

POD S in Data Centres. The Frame Group Pty Ltd

POD S in Data Centres. The Frame Group Pty Ltd Presented by: Greg Goode The Frame Group Pty Ltd DATA Centres? POD SOLUTIONS REFERRED TO AS: Cells Modular Rooms High Density Zones Portable Modular Data Centres (Containers) Multiple Interpretations Varied

More information

Energy Efficiency and Availability Management in Consolidated Data Centers

Energy Efficiency and Availability Management in Consolidated Data Centers Energy Efficiency and Availability Management in Consolidated Data Centers Abstract The Federal Data Center Consolidation Initiative (FDCCI) was driven by the recognition that growth in the number of Federal

More information

OPERATOR - FACILITY ADDRESS - DATE

OPERATOR - FACILITY ADDRESS - DATE . Facility Criteria (RFP).0 Location Characteristics Criteria Requirements 1 Ownership and Management: Please identify the owner(s) and managers of the property and indicate if there is on-site management.

More information

L-1 Fingerprint Reader Solutions. V-Flex 4G

L-1 Fingerprint Reader Solutions. V-Flex 4G L- Fingerprint Reader Solutions V-Flex 4G 4G Biometric Performance Redefined with a Flexible and Powerful Device to Secure any Size Premises Advanced Features Large Template Storage Capacity (0,000 in

More information

Racks & Enclosures. Deliver. Design. Define. Three simple words that clearly describe how we approach a Data Center project.

Racks & Enclosures. Deliver. Design. Define. Three simple words that clearly describe how we approach a Data Center project. Three simple words that clearly describe how we approach a Data Center project. Eclipse Racks & Enclosures DELIVERING THE RIGHT INFRASTRUCTURE FOR YOUR MISSION-CRITICAL NEEDS SERVER RACKS & NETWORKING

More information

Management and Wireless in the Data Center

Management and Wireless in the Data Center SOLUTIONS BRIEF Management and Wireless in the Data Center High Performance Wireless Networks Management and Wireless in the Data Center Worldwide demand for new and more powerful IT-based applications,

More information

Security in the smart grid

Security in the smart grid Security in the smart grid Security in the smart grid It s hard to avoid news reports about the smart grid, and one of the media s favorite topics is security, cyber security in particular. It s understandable

More information

Access Server Rack Cabinet Compatibility Guide

Access Server Rack Cabinet Compatibility Guide Access Server Rack Cabinet Compatibility Guide A Guide to the Selection and Evaluation of Access Server Rack Cabinets for Compatibility and Use with Third Party Server Chassis Kalkenstraat 91-93 B-8800

More information

Cabinet & Enclosure Systems

Cabinet & Enclosure Systems Cabinet & Enclosure Systems Optimize. Store. Secure. CPI Cabinets Optimize. Store. Secure. The cabinet platform on which your enterprise is built is just as critical as the equipment it stores. Utilizing

More information

Using CFD for optimal thermal management and cooling design in data centers

Using CFD for optimal thermal management and cooling design in data centers www.siemens.com/datacenters Using CFD for optimal thermal management and cooling design in data centers Introduction As the power density of IT equipment within a rack increases and energy costs rise,

More information

Rack Hygiene. Data Center White Paper. Executive Summary

Rack Hygiene. Data Center White Paper. Executive Summary Data Center White Paper Rack Hygiene April 14, 2011 Ed Eacueo Data Center Manager Executive Summary This paper describes the concept of Rack Hygiene, which positions the rack as an airflow management device,

More information

Security Overview. A guide to data security at AIMES Data Centres. www.aimesgridservices.com TEL: 0151 905 9700 enquiries@aimes.

Security Overview. A guide to data security at AIMES Data Centres. www.aimesgridservices.com TEL: 0151 905 9700 enquiries@aimes. Security Overview A guide to data security at AIMES Data Centres www.aimesgridservices.com TEL: 0151 905 9700 enquiries@aimes.net Page 1 of 10 Contents I. Protecting our clients data...2 II. Information

More information

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,

More information

Protecting Data Center Assets

Protecting Data Center Assets Protecting Data Center Assets Enclosures Pages 4-6 Physical protection for your critical IT infrastructure Power Page 7 Flexible power to ensure 100% uptime KVM Page 7 Access & control your IT devices

More information

IBM Portable Modular Data Center Overview for Critical Facilities Round Table

IBM Portable Modular Data Center Overview for Critical Facilities Round Table Brian Canney Global Services Executive, IBM GTS Site and Facilities Services April 2011 IBM Portable Modular Data Center Overview for Critical Facilities Round Table 2009 IBM Corporation Key messages Containers

More information

Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee

Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee Marquee Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Securing the Workplace Executive Summary OPTIMIZE TODAY S WORKPLACE Protecting

More information

Data Center Solutions - The Containerized Evolution

Data Center Solutions - The Containerized Evolution Data Center Solutions - The Containerized Evolution Power IT Cooling 7 th Green Connected World Tsikogias Thanassis Data Centers Solutions Architect, IT Business Athens 2015 1 We are the global specialist

More information

Nine Network Considerations in the New HIPAA Landscape

Nine Network Considerations in the New HIPAA Landscape Guide Nine Network Considerations in the New HIPAA Landscape The Health Insurance Portability and Accountability Act of 1996 (HIPAA) Omnibus Final Rule, released January 2013, introduced some significant

More information

InstaPATCH ZERO Solution Guide

InstaPATCH ZERO Solution Guide SYSTIMAX Solutions InstaPATCH ZERO Solution Guide Rapid Server Deployment and Change Management North, South and Central Americas 1 As data centers face ever-increasing IT demands, growth demands and evolving

More information

Great Lakes Data Room Case Study

Great Lakes Data Room Case Study Great Lakes Data Room Case Study WeRackYourWorld.com Problem: During a warm summer period in 2008, Great Lakes experienced a network outage due to a switch failure in the network enclosure. After an equipment

More information

Data Sheet FUJITSU PRIMECENTER M2 19-inch Racks

Data Sheet FUJITSU PRIMECENTER M2 19-inch Racks Data Sheet FUJITSU PRIMECENTER M2 19-inch Racks Data Sheet FUJITSU PRIMECENTER M2 19-inch Racks 19-inch Industry Standard Rack Systems The trend to consolidation as a result of virtualization and optimization

More information

Sealing Gaps Under IT Racks: CFD Analysis Reveals Significant Savings Potential

Sealing Gaps Under IT Racks: CFD Analysis Reveals Significant Savings Potential TECHNICAL REPORT Sealing Gaps Under IT Racks: CFD Analysis Reveals Significant Savings Potential By Lars Strong, P.E., Upsite Technologies, Inc. Bruce Long, Upsite Technologies, Inc. +1.888.982.7800 upsite.com

More information

Colocation Selection Guide. Workspace Technology Ltd

Colocation Selection Guide. Workspace Technology Ltd Colocation Selection Guide Workspace Technology Ltd Technology House 5 Emmanuel Court Reddicroft Sutton Coldfield West Midlands B72 1TJ Tel 0121 354 4894 Fax 0121 354 6447 www.workspace-technology.com

More information

Technology Corporation

Technology Corporation 1 White Paper Meeting The Increased Demand For Efficient Computer Room Cooling Server Cooling Problems: An Overview As microprocessors and other electronic components in servers grow more powerful, they

More information

Colocation and Cloud Hosting Solutions. Build a strong and efficient physical infrastructure that delivers service reliability and profitability

Colocation and Cloud Hosting Solutions. Build a strong and efficient physical infrastructure that delivers service reliability and profitability Colocation and Cloud Hosting Solutions Build a strong and efficient physical infrastructure that delivers service reliability and profitability 2 Dependability and Deployment Speed that Improves Your Bottom

More information

Distributing Power to Blade Servers

Distributing Power to Blade Servers Distributing Power to Blade Servers Ten steps to selecting the optimal power distribution design With the growth in blade servers with dual or triple power supplies, a single rack of equipment can easily

More information

Overview. Step 1: Including All Players

Overview. Step 1: Including All Players Overview 10 Steps to Holistic Data Center Design Michael Salvador Technical Solutions Manager for Data Centers at Belden Table of Contents Overview.... 1 Step 1: Including All Players... 1, 2 Step 2: Setting

More information

Georgia Tech Aerospace Server French building Server Room. Server Room Policy Handbook: Scope, Processes and Procedure

Georgia Tech Aerospace Server French building Server Room. Server Room Policy Handbook: Scope, Processes and Procedure Georgia Tech Aerospace Server French building Server Room Server Room Policy Handbook: Scope, Processes and Procedure Version History Version/Status Release Date Comments 1.1/Draft 1.2 1.3 1.4 1.5 1.6

More information

Data Center Power Consumption

Data Center Power Consumption Data Center Power Consumption A new look at a growing problem Fact - Data center power density up 10x in the last 10 years 2.1 kw/rack (1992); 14 kw/rack (2007) Racks are not fully populated due to power/cooling

More information

S c h n e i d e r E l e c t r i c BUSINESS IMPACT. Jack Hack Enterprise System Engineer 19 November 2015

S c h n e i d e r E l e c t r i c BUSINESS IMPACT. Jack Hack Enterprise System Engineer 19 November 2015 S c h n e i d e r E l e c t r i c BUSINESS IMPACT Datacenter means business - create the bridge between IT en Facilities. Jack Hack Enterprise System Engineer 19 November 2015 1 Your ability to compete

More information

Education Evolution: Scalable Server Rooms George Lantouris Client Relationship Manager (Education) May 2009

Education Evolution: Scalable Server Rooms George Lantouris Client Relationship Manager (Education) May 2009 Education Evolution: Scalable Server Rooms George Lantouris Client Relationship Manager (Education) May 2009 Agenda Overview - Network Critical Physical Infrastructure Cooling issues in the Server Room

More information

Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1

Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1 JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us

More information

Verizon SMARTS Data Center Design Phase 1 Conceptual Study Report Ms. Leah Zabarenko Verizon Business 2606A Carsins Run Road Aberdeen, MD 21001

Verizon SMARTS Data Center Design Phase 1 Conceptual Study Report Ms. Leah Zabarenko Verizon Business 2606A Carsins Run Road Aberdeen, MD 21001 Verizon SMARTS Data Center Design Phase 1 Conceptual Study Report Ms. Leah Zabarenko Verizon Business 2606A Carsins Run Road Aberdeen, MD 21001 Presented by: Liberty Engineering, LLP 1609 Connecticut Avenue

More information

Title: Design of a Shared Tier III+ Data Center: A Case Study with Design Alternatives and Selection Criteria

Title: Design of a Shared Tier III+ Data Center: A Case Study with Design Alternatives and Selection Criteria Tier 3+ 1 Title: Design of a Shared Tier III+ Data Center: A Case Study with Design Alternatives and Selection Criteria Abstract: Schoolcraft College is constructing a High Availability (HA) Data Center

More information

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,

More information

How To Improve Energy Efficiency In Data Center Management

How To Improve Energy Efficiency In Data Center Management A White Paper from the Experts in Business-Critical Continuity TM Data Center Users Group Special Report Energy efficiency and capacity concerns increase Fall 2012 Survey Results Executive Summary The

More information

Sophistication of attacks will keep improving, especially APT and zero-day exploits

Sophistication of attacks will keep improving, especially APT and zero-day exploits FAQ Isla Q&A General What is Isla? Isla is an innovative, enterprise-class web malware isolation system that prevents all browser-borne malware from penetrating corporate networks and infecting endpoint

More information

CommScope Intelligent Building Infrastructure Solutions (IBIS)

CommScope Intelligent Building Infrastructure Solutions (IBIS) SYSTIMAX Solutions CommScope Intelligent Building Infrastructure Solutions (IBIS) Questions & Answers Q. What is an Intelligent Building? A. An intelligent building can be defined as one which provides

More information

ProjectManager.com Security White Paper

ProjectManager.com Security White Paper ProjectManager.com Security White Paper Standards & Practices www.projectmanager.com Introduction ProjectManager.com (PM) developed its Security Framework to continue to provide a level of security for

More information

Managing Data Centre Heat Issues

Managing Data Centre Heat Issues Managing Data Centre Heat Issues Victor Banuelos Field Applications Engineer Chatsworth Products, Inc. 2010 Managing Data Centre Heat Issues Thermal trends in the data centre Hot Aisle / Cold Aisle design

More information

HELIUM PULSE FOR MONITORING AND ALERTING HELIUM SMART SENSORS HELIUM NETWORK HELIUM CLOUD HELIUM PULSE HP20160414-01

HELIUM PULSE FOR MONITORING AND ALERTING HELIUM SMART SENSORS HELIUM NETWORK HELIUM CLOUD HELIUM PULSE HP20160414-01 HELIUM PULSE FOR MONITORING AND ALERTING Helium Pulse enables organizations to make sense of their things; to easily and cost-effectively monitor their assets and the environment to maximize performance

More information

Defending your data against physical threats

Defending your data against physical threats Defending your data against physical threats Facts and guidelines for Datacentre Security Management 1 2 Physical security A vital link in data centre defence The exponential rise in data centres is matched

More information

StruxureWare TM Data Center Operation for Co-location

StruxureWare TM Data Center Operation for Co-location StruxureWare TM Data Center Operation for Co-location End to end data center infrastructure management software for monitoring and control of power, cooling, security and energy usage from the building

More information

Comprehensive Data Center Energy Management Solutions

Comprehensive Data Center Energy Management Solutions FROM INSIGHT TO EFFICIENCY: Comprehensive Data Center Energy Management Solutions Since 1995, facility managers and BAS professionals have relied on the Niagara Framework to provide full convergence of

More information

Comprehensive Data Center Energy Management Solutions

Comprehensive Data Center Energy Management Solutions FROM INSIGHT TO EFFICIENCY: Comprehensive Data Center Energy Management Solutions Since 1995, facility managers and BAS professionals have relied on the Niagara framework to provide full convergence of

More information

Evaluating Datacenter Colocation

Evaluating Datacenter Colocation 1/14 Evaluating Datacenter Colocation Flexibility and Security for Business Growth 2/14 The Advantages of Colocation Colocation is a service that allows customers to install and operate computer server

More information

Colt Colocation Services. 2010 Colt Technology Services Group Limited. All rights reserved.

Colt Colocation Services. 2010 Colt Technology Services Group Limited. All rights reserved. Colt Colocation Services 2010 Colt Technology Services Group Limited. All rights reserved. Award winning Colt Data Centre Solutions 2012: Modular Data Centre Solution of the year winner at 5 th Datacentre

More information

THE WORLD S MOST EFFICIENT DATA CENTER

THE WORLD S MOST EFFICIENT DATA CENTER THE WORLD S MOST EFFICIENT DATA CENTER HP POD 240a Ed Turkel Manager, WW HPC Marketing Hyperscale Business Unit 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject

More information

THE IMPACT OF CURRENT TRENDS ON THE DATA CENTER COMMUNICATIONS CABLING INFRASTRUCTURE

THE IMPACT OF CURRENT TRENDS ON THE DATA CENTER COMMUNICATIONS CABLING INFRASTRUCTURE THE IMPACT OF CURRENT TRENDS ON THE DATA CENTER COMMUNICATIONS CABLING INFRASTRUCTURE Prepared by Michael Wood Senior Product Manager Data Center Infrastructure Systems Hubbell Premise Wiring www.hubbell-premise.com

More information